Cyber threats and attacks continue to grow in number and complexity, as the business world becomes increasingly connected and digital.
So it’s important to understand what the new cyber risks are.
By completing this form, you can check the security status of your company’s IT system, and identify areas for improvement.

    General safety

    1. Do you collect, process and/or store this type of data?

    Customer information

    Medical/health information

    Banking information

    Intellectual property / Trade secrets

    Other

    2. Do you pass on data (personal or otherwise) to third parties?

    3. Has your SME defined who is responsible for cyber protection?

    Outsourcing your IS

    4. Have you chosen to outsource certain functions of your IT system?

    [wpmlcf7-9-group group-862]

    Which ones?
    Computer management Network management Server management Network security management Application management Use of cloud computing [/wpmlcf7-9-group]

    [/group]

    Data security

    5. Do you have antivirus software on all your hardware?

    6. Is it regularly updated?

    7. Do you use firewalls to prevent unauthorized access?

    8. 7.
    Les données de vos systèmes (dispositifs de stockage et de sauvegarde des données, terminaux, serveurs) sont-elles cryptées ?

    Data backup

    9. Do you make regular backups, with backup files in different locations?

    10. If applicable, do you have a disaster recovery system for your critical applications?

    Training and awareness-raising

    11. Do your employees receive regular training on data protection and security, and cybercrime in particular (at least once a year)?

    12. Do your staff have internal guidelines on the safe use of e-mail, digital data and the Internet?

    Remote access

    14. Is remote access to your PMEe administration's infrastructure of computers, servers and network protected (virtual private network [VPN], two-factor authentication)?

    Minimum precautions for emergency situations

    15. Have you defined emergency measures in the event of an IT incident?

    16. Is the person responsible and your contact persons in the event of an IT incident (e.g. malfunction, attack, etc.) defined and available?

    Generate my report

    Based on your answers to this questionnaire, take the time to consider your security priorities in order to protect your company from cyber-attacks.

    Our team will be happy to answer any questions you may have about your company's current security situation and any priorities that need to be addressed.